- This event has passed.
Mid-Missouri Cyber Security Summit
October 6, 2016 @ 7:30 am - 2:00 pmFREE
[threecol_two]Mid-Missouri’s only security summit for top business owners, executives, CIOs, CISOs and critical technology security staff.
There is nothing as essential or as vulnerable as your organization’s network. It provides access to your critical applications and houses your sensitive company and client data. A single network security breach can shut down your operations for days or allow a hacker to steal vital organization data. This is happening in mid-Missouri, and you could be next. It is simply a matter of when – not if – your organization will have a problem and whether or not you are ready.
Just when you think things are fine, hackers hit. Always keep learning how to better protect your business. You don’t want to be the one to blame when they strike. Join us to gain an exclusive look at the changing security landscape with local security and software experts. Together we will explore the challenges you’re facing as you struggle to fight off new threats.
7:30am : Registration
8:15: The 5 Steps Hackers Use To Own Your Company, Jerry Gamblin, Security Specialist
Jerry Gamblin (@JGamblin), a security professional and white hat hacker will talk about IoT Security and will share some of his recent research and show how easy it is for criminals to hack the least expected devices on a corporate network and use them to pivot around to find the company’s crown jewels.
9:00: Ransomware Epidemic, Troy Campbell, Director, Cyber Threat Intelligence Program and IT Director, Kansas City Terrorism Early Warning Fusion Center
Much like the rest of the world, mid-Missouri has seen its fair share of ransomware over the past 18 months. According to Newsweek, Americans paid over $325 million due to ransomware attacks in 2015. So how do you protect you and your organization? What is the appropriate response? What are the legal issues and what is the role of law enforcement? Troy will provide the latest information you need to be better prepared for preventing or remediating a ransomware attack on your data.
10:00am: Applying Security Concepts to the Real World, Kevin Switzer, Systems Engineer, Cisco Systems
Our Cisco Security Expert, Kevin, will explore the broad survey of security aspects (ie: network security, data security, social engineering, physical security etc.) that need to be considered when organizations are addressing their vulnerabilities in regards to Cybersecurity. He will then apply these broad concepts to a real world use case and analyze how it played out in reality which will include the techniques and methods they used to resolve the issue as well as solutions that could have been used to prevent the situation from ever happening in the first place.
11:15: Working Lunch/Responding to a Security Breach: Evaluating Your Need for Cyber Liability Insurance, Gabe Hulsey, Redwood Financial Group
Join Gabe Hulsey, Redwood Financial Group, for a packed session on cyber liability insurance. Gabe will review the key areas of a policy and the critical features a policy provides in the event of a data breach. Some cyber liability may be included in other policies, but after reading the fine print you’ll notice some major differences potentially costing you huge monetary penalty or closing down your business.
12:45: HIPAA IT Security Breakout – Managing the IT Security Rule, Kayla Wilbers, IT Consultant, Huber & Associates
Your practice administrator responsibilities are endless, so Kayla has put together an introductory guide for implementing the HIPAA Security Rule. You’ll be provided with the list of requirements and how to comply with them. In addition to the reason compliance is important – that part is so you can convince you physician(s) why it’s so important!